Home  >  Article  >  What does disconnecting the terminal when the computer ends belong to

What does disconnecting the terminal when the computer ends belong to

(*-*)浩
(*-*)浩Original
2019-11-18 13:38:446302browse

What does disconnecting the terminal when the computer ends belong to

Disconnecting the terminal when the computer is finished belongs to the physical security of the external terminal.

Endpoint security management is a strategic approach to protecting network security that requires terminal devices to comply with specific standards before being allowed to access network resources. (Recommended learning: web front-end video tutorial)

Terminal security management measure one: always prepare, timely protection

After a long period of exploration, Analysis, we can roughly divide computer terminal security into two aspects, namely the physical security of computer terminals and the system security of computer terminals.

The physical security of computer terminals mainly refers to the security of the physical environment where the computer is located and the security of the computer's own hardware. The safety of the physical environment is like a person's survival, living and working environment. If the environment is suitable, the mood and work will be more comfortable. When the environment is bad, people will also get sick.

Similarly, computers also have their own suitable working environment (note: humidity, temperature, voltage, lightning strikes, etc. of the surrounding environment). When one or more factors of the environment exceed the ultimate endurance of the computer, Computers can get "sick" just like people.

The second point for the physical security of computer terminals is the self-security of each computer component, such as hardware wear and tear, man-made damage, theft and loss, etc. At this time, we have the main problems during the use of the computer. For hardware protection and maintenance work.

Terminal security management measure two: Coordinated and comprehensive management

Terminal security management is to integrate the assets, vulnerabilities and threat information discovered during the terminal security protection process. Summary, sorting and statistics are carried out to realize the management of the whole life cycle of terminal security risks; through in-depth correlation analysis of data, a correlation analysis report is formed to provide a basis for the formulation of terminal security policies;

View security policies The overall status of terminal security risks in the province after global distribution provides decision-making support for the adjustment of security policies; it provides different security views for different users to ensure that users at different levels can quickly and easily understand the security information they care about.

Terminal security management measure three: Management and technology simultaneously

No matter how mature and advanced technology is, it is used and served by people. The quality of technology is very different. On a large level, it all depends on the user, which means that technology itself has no bias, but with the existence of users, technology becomes a double-edged sword.

Therefore, while focusing on technical management, people have also been conducting manual management and human intervention on computer information systems to prevent illegal and criminal personnel from destroying computers and information systems and making profits.

Terminal Security Management Measures Four: Other Protective Measures

With the progress of human society and the development of scientific and technological civilization, there are many ways for computer information to be leaked. Diverse. Above we have introduced some security risks and prevention methods regarding computer operating systems and hardware. Below we will conduct a detailed analysis of another security threat faced by computers - electromagnetic leakage.

The above is the detailed content of What does disconnecting the terminal when the computer ends belong to. For more information, please follow other related articles on the PHP Chinese website!

Statement:
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn